International audienceSemantic Web connects huge knowledge bases whose content has been generated from collaborative platforms and by integration of heterogeneous databases. Naturally, these knowledge bases are incomplete and contain erroneous data. Knowing their data quality is an essential long-term goal to guarantee that querying them returns reliable results. Having cardinality constraints for roles would be a significant advance to distinguish correctly and completely described individuals from those having data either incorrect or insufficiently informed. In this paper, we propose a method for automatically discovering from the knowledge base’s content the maximum cardinality of roles for each concept, when it exists. This method is robu...
The Internet has enabled the creation of a growing num-ber of large-scale knowledge bases in a varie...
Efficient reasoning in large knowledge bases is an important problem for AI systems. Hand-optimizati...
Abstract. Data mining algorithms are often embedded in more com-plex systems, serving as the provide...
Cardinality is an important structural aspect of data that has not received enough attention in the ...
Role Based Access Control (RBAC) is a very popular access control model, for long time investigated ...
Part 4: Access ControlInternational audienceWith the emergence of Role Based Access Control (RBAC) a...
We present an approach to mine cardinality restriction axioms from an existing knowledge graph, in o...
Role Based Access Control (RBAC) is a very popular access control model, for a long time investigate...
This article is a companion to an invited talk at ICDT\u272022 with the same title. Cardinality esti...
Role-based access control (RBAC) defines the methods complex organizations use to assign their users...
Most modern search engines feature keyword based search interfaces. These interfaces are usually fou...
Role-based access control (RBAC) has become a de facto standard to control access to restricted reso...
Le développement rapide des techniques d’extraction d’information a permis de construire de vastes b...
The results of the experiment described in the paper Mining Cardinality Restrictions in OWL (J. Poto...
Cardinality estimation is an important component of query optimization. Its accuracy and efficiency ...
The Internet has enabled the creation of a growing num-ber of large-scale knowledge bases in a varie...
Efficient reasoning in large knowledge bases is an important problem for AI systems. Hand-optimizati...
Abstract. Data mining algorithms are often embedded in more com-plex systems, serving as the provide...
Cardinality is an important structural aspect of data that has not received enough attention in the ...
Role Based Access Control (RBAC) is a very popular access control model, for long time investigated ...
Part 4: Access ControlInternational audienceWith the emergence of Role Based Access Control (RBAC) a...
We present an approach to mine cardinality restriction axioms from an existing knowledge graph, in o...
Role Based Access Control (RBAC) is a very popular access control model, for a long time investigate...
This article is a companion to an invited talk at ICDT\u272022 with the same title. Cardinality esti...
Role-based access control (RBAC) defines the methods complex organizations use to assign their users...
Most modern search engines feature keyword based search interfaces. These interfaces are usually fou...
Role-based access control (RBAC) has become a de facto standard to control access to restricted reso...
Le développement rapide des techniques d’extraction d’information a permis de construire de vastes b...
The results of the experiment described in the paper Mining Cardinality Restrictions in OWL (J. Poto...
Cardinality estimation is an important component of query optimization. Its accuracy and efficiency ...
The Internet has enabled the creation of a growing num-ber of large-scale knowledge bases in a varie...
Efficient reasoning in large knowledge bases is an important problem for AI systems. Hand-optimizati...
Abstract. Data mining algorithms are often embedded in more com-plex systems, serving as the provide...